d76d0e97013ebfb65e7b94311c49a684929b725d46116f4487c8d0e2dd77c466
29f0e9447da0be5b7b277fb4601c2dbebe5ec1ed
df1adf245bf56c65c8ddf0e2baa55bf8
4.15.0-189.200
linux-tools-4.15.0-189_4.15.0-189.200_i386.deb
16018
DEB
linux
I386
Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
libaudit1 (>= 1:2.2.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.4.15.0-189 /usr/lib/libcpupower.so.4.15.0-189 | 63856 | 0 | ||
usbip /usr/lib/linux-tools-4.15.0-189/usbip | 210076 | 0 | ||
libperf-jvmti.so /usr/lib/linux-tools-4.15.0-189/libperf-jvmti.so | 185868 | 0 | ||
turbostat /usr/lib/linux-tools-4.15.0-189/turbostat | 144516 | 0 | ||
cpupower /usr/lib/linux-tools-4.15.0-189/cpupower | 244748 | 0 | ||
perf /usr/lib/linux-tools-4.15.0-189/perf | 14484376 | 0 | ||
bpftool /usr/lib/linux-tools-4.15.0-189/bpftool | 129300 | 0 | ||
usbipd /usr/lib/linux-tools-4.15.0-189/usbipd | 208156 | 0 | ||
x86_energy_perf_policy /usr/lib/linux-tools-4.15.0-189/x86_energy_perf_policy | 36764 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-33981 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1195 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-2588 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-2586 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1974 | 41 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1679 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1734 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1652 | 78 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-0494 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1048 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-34918 | 0 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1975 | 55 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-1729 | 70 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-2503 | 67 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-20572 | 7 | USN | linux-tools-host 4.15.0-191.202 |
CVE-2022-2991 | 67 | USN | linux-tools-host 4.15.0-191.202 |
{ "sha256": "d76d0e97013ebfb65e7b94311c49a684929b725d46116f4487c8d0e2dd77c466", "sha1": "29f0e9447da0be5b7b277fb4601c2dbebe5ec1ed", "md5": "df1adf245bf56c65c8ddf0e2baa55bf8", "type": "DEB", "arch": "I386", "name": "linux-tools-4.15.0-189", "filename": "linux-tools-4.15.0-189_4.15.0-189.200_i386.deb", "size": 16018, "description": "Linux kernel version specific tools for version 4.15.0-189\nThis package provides the architecture dependant parts for kernel\nversion locked tools (such as perf and x86_energy_perf_policy) for\nversion 4.15.0-189 on\n32 bit x86.\nYou probably want to install linux-tools-4.15.0-189-<flavour>.", "url": null, "version": "4.15.0-189.200", "source": "linux", "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>", "dependencies": "libaudit1 (>= 1:2.2.1), libc6 (>= 2.17), libdw1 (>= 0.157), libelf1 (>= 0.144), liblzma5 (>= 5.1.1alpha+20120614), libnuma1 (>= 2.0.11), libpci3 (>= 1:3.5.2-1), libslang2 (>= 2.2.4), libudev1 (>= 183), libunwind8, zlib1g (>= 1:1.1.4), linux-tools-common", "applications": [ { "path": "/usr/lib/libcpupower.so.4.15.0-189", "sha256": "63d0e9dfa0761a55b7b83b2854c8203c38056dfd046a2e2f750a4cb4d73c2f3e", "sha1": "92816e94219e7e39fdf261a1b98c4a9c9c6f9f90", "md5": "27a0d4aa1f0a2214c4def5c799fa814c", "name": "libcpupower.so.4.15.0-189", "size": 63856, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/usbip", "sha256": "ee8845404643c42f44b3aa359ba92aa6c83ae26b468ab2b383d875ef1c8f7429", "sha1": "622fc724b243a196d5db63accd874dd63a907db9", "md5": "ffcd9c63ab04ee8009bdd5d722c8acde", "name": "usbip", "size": 210076, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/libperf-jvmti.so", "sha256": "67704b2e461af3d821fa5ff6e062792f4b39195f39128e5bb0b431ba3cac882b", "sha1": "400539ba36096e5d405d4867cf4386793449d8be", "md5": "fde1abe63bf70fd5ad75ef9f24491a82", "name": "libperf-jvmti.so", "size": 185868, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/turbostat", "sha256": "a4053f9d5306ed3c0596bb3604f3e6d29c54d12d2d00e83a202e6722ef39bf1c", "sha1": "520a586387ca866b9a3ae715e5e22d1cf98eff8e", "md5": "ebae0c86933450a6cf33c58fc68c8244", "name": "turbostat", "size": 144516, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/cpupower", "sha256": "224f273fee4488d77336a0ec9236f77d906dd4bc8084a65309fa9f757115d3aa", "sha1": "3e61f39a0c6a1de41b62b9e3f485cb8bb339901a", "md5": "91979b3eff7df924ad8c31ed3d100fc7", "name": "cpupower", "size": 244748, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/perf", "sha256": "07d4a7ee1e1854062d36a7a67ab53914f4a0ecd7bf4f5f990786e5ab7aea92f0", "sha1": "8c186ce285b61d87835070976466879f82cc39bf", "md5": "777848e3a05bdeb65bbcd48e456d3f75", "name": "perf", "size": 14484376, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/bpftool", "sha256": "b962e3bd9dfd59adbe21d90dcb70c2aa52681f8f09d5d50b05aac23e13b051e1", "sha1": "d2a3f0d52001c32bd920feaed044e6a1e88d0ef5", "md5": "eca4efb78fa934a51d2e38dc78047a3f", "name": "bpftool", "size": 129300, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/usbipd", "sha256": "c7fb4112a8b7483cf2c20b1ce5ae12e77fd989c33f63d4b703dbaef1fbdb016f", "sha1": "87ea19125b561aae2e33012659f29421d0ccfd84", "md5": "4681161af0dfaa9b333239cfb8572e26", "name": "usbipd", "size": 208156, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null }, { "path": "/usr/lib/linux-tools-4.15.0-189/x86_energy_perf_policy", "sha256": "69b321213102004e01879b98709d1e6049989e69c5cbeed1ef9321930c27ef02", "sha1": "ae591ced33680faf624495f25303db664dbb70e7", "md5": "06cfa660d801d7facf30dd2977c2cd0e", "name": "x86_energy_perf_policy", "size": 36764, "description": null, "package": 3811262, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-29T03:06:24+00:00", "updated_at": "2022-06-29T03:06:24+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-33981", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T02:49:40+00:00", "updated_at": "2022-08-11T02:49:40+00:00" }, { "name": "CVE-2022-1195", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:00:06+00:00", "updated_at": "2022-08-11T03:00:06+00:00" }, { "name": "CVE-2022-2588", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:02:01+00:00", "updated_at": "2022-08-11T03:02:01+00:00" }, { "name": "CVE-2022-2586", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:15:52+00:00", "updated_at": "2022-08-11T03:15:52+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:16:53+00:00", "updated_at": "2022-08-11T03:16:53+00:00" }, { "name": "CVE-2022-1679", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:24:12+00:00", "updated_at": "2022-08-11T03:24:12+00:00" }, { "name": "CVE-2022-1734", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:26:48+00:00", "updated_at": "2022-08-11T03:26:48+00:00" }, { "name": "CVE-2022-1652", "risk": 78, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:29:21+00:00", "updated_at": "2022-08-11T03:29:21+00:00" }, { "name": "CVE-2022-0494", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:31:19+00:00", "updated_at": "2022-08-11T03:31:19+00:00" }, { "name": "CVE-2022-1048", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:39:11+00:00", "updated_at": "2022-08-11T03:39:11+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:41:22+00:00", "updated_at": "2022-08-11T03:41:22+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:45:50+00:00", "updated_at": "2022-08-11T03:45:50+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2022-08-11T03:56:09+00:00", "updated_at": "2022-08-11T03:56:09+00:00" }, { "name": "CVE-2022-2503", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2023-01-29T13:12:04+00:00", "updated_at": "2023-01-29T13:12:04+00:00" }, { "name": "CVE-2022-20572", "risk": 7, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2023-03-07T11:46:12+00:00", "updated_at": "2023-03-07T11:46:12+00:00" }, { "name": "CVE-2022-2991", "risk": 67, "source": "USN", "sid": null, "fixed": { "sha256": "69f98a238bcf3c93045830fe14f650cf9c52b9e1be1068e6fdf82d9bfd0e02b5", "name": "linux-tools-host", "version": "4.15.0-191.202", "filename": "linux-tools-host_4.15.0-191.202_all.deb" }, "created_at": "2023-04-21T09:38:44+00:00", "updated_at": "2023-04-21T09:38:44+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-06-22T22:06:30+00:00", "updated_at": "2022-06-29T02:06:23+00:00", "deleted_at": null }